Security Architecture Cycle

computer science

Description

This final assignment is the logical continuation of assignment #1. In assignment #1, you researched your

organization or school to determine its database architecture, and you designed an Assessment and

Analysis plan (Phase 1 of the Security Architecture Cycle) for your organization. In particular, you had

to:


 Identify the assets to be protected

 Define and prioritize the threats against those assets


In this final assignment, you are asked to (partially) implement Phase 2 of the Security Architecture

Cycle (“Design and Modeling”, described on page 25 of the textbook). Armed with the knowledge you

acquired during this term, you should be able to write policies and to prototype a security architecture that

fit the needs of the business (or school) you selected in assignment #1. In particular, you should address:

 What security policies need to be put into place in order to mitigate the identified threats? Security

Policies are addressed on page 27. Some additional guidelines and examples are given below.

 What firmware/software changes need to take place to minimize vulnerabilities and support policies?

Given the database management system used in your selected environment and given the policy

requirements, what changes in software version/configuration must be done?

 What security tools or applications should be added to minimize risk?


You are asked to include the description of the environment, the identified assets and threats from

assignment #1 in the final assignment. Please feel free to make some "guesses" about the described

environment. Your final submission should be professional-looking. The expected length is between 6

to15 pages. 


 Guidelines for writing the policy:


 A security policy describes what it means for an organization to be secure. It is an agreed upon

a document that executive management uses to communicate its security goals and objectives. Thus,

the language should be appropriate for all employees.

 The goal of such a policy is generally to protect valuable and/or confidential information from

unauthorized access, but also to limit legal liability and prevent waste or inappropriate use of organization

resources. Phrases such as “must”, “should”, or “will” are used to establish baseline expectations for

behavior by employees and to authorize audits and monitoring.

Instruction Files

Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.